Results 61 to 70 of about 72,952 (289)
Continuous and low-cost broadcast authentication is a fundamental security service for distributed sensor networks. This paper presents a novel development of a continuous and low-overhead broadcast authentication protocol named enhanced Infinite timed ...
Khouloud Eledlebi +5 more
doaj +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley +1 more source
The Message Authentication Code Based on Universal Hashing
The article covers the research of message authentication codes based on universal hashing. The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article.
T. A. Bilyk, A. U. Nesterenko
doaj
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY [PDF]
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data ...
GURPREET K. SODHI, GURJOT S. GABA
doaj
Performance analysis of a security architecture for active networks in Java [PDF]
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo +3 more
core +2 more sources
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser +11 more
wiley +1 more source
Crypto-Verifying Protocol Implementations in ML [PDF]
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core +2 more sources
Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the ...
Svozil, Karl
core +2 more sources
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez +17 more
wiley +1 more source

